SlideShare a Scribd company logo
 "In the next century, planet earth will don 
an electronic skin. It will use the Internet 
as a scaffold to support and transmit its 
sensations."- Neil Gross, 1999 
 In a recent study, the researchers have 
predicted that the Internet will double in 
size every 5.32 years 
 By 2020, 20 billion devices will be in use in 
the world [0]
 The Internet of Things is an emerging global 
Internet-based technical architecture 
facilitating the exchange of goods in a global 
supply-chain network.[1] 
 Rapid advancement in technology in just 21 
years 
 IPv6 communication 
 Protocol for M2M communication 
 Smart sensors 
 Cloud storage 
 Sophisticated algorithms via machine learning
 The Internet of Things (IoT) is a scenario in 
which objects, animals or people are 
provided with unique identifiers and the 
ability to transfer data over a network 
without requiring human-to-human or 
human-to-computer interaction. IoT has 
evolved from the convergence of 
wireless technologies, micro-electromechanical 
systems (MEMS) and 
the Internet.
 A thing, in the Internet of Things, can be a person with 
a heart monitor implant, a farm animal with a biochip 
transponder, an automobile that has built-in sensors 
to alert the driver when tire pressure is low -- or any 
other natural or man-made object that can be 
assigned an IP address and provided with the ability 
to transfer data over a network. So far, the Internet of 
Things has been most closely associated with 
machine-to-machine (M2M) communication in 
manufacturing and power, oil and gas utilities. 
Products built with M2M communication capabilities 
are often referred to as being smart. (See: smart 
label, smart meter, smart grid sensor)
 The Internet of Things is a difficult concept 
to define precisely. In fact, there are many 
different groups that have defined the 
term, although its initial use has been 
attributed to Kevin Ashton, an expert on 
digital innovation. Each definition shares the 
idea that the first version of the Internet was 
about data created by people, while the 
next version is about data created by 
things. In 1999, Ashton said it best in this 
quote from an article in the RFID Journal:
 
"If we had computers that knew everything 
there was to know about things - using data 
they gathered without any help from us - 
we would be able to track and count 
everything, and greatly reduce waste, loss 
and cost. We would know when things 
needed replacing, repairing or recalling, 
and whether they were fresh or past their 
best".
 
Most of us think about being connected 
in terms of computers, tablets and 
smartphones. IoT describes a world 
where just about anything can be 
connected and communicate in an 
intelligent fashion. In other words, with 
the Internet of Things, the physical world 
is becoming one big information system.
 Cisco estimates that 50 billion devices and objects 
will be connected to the Internet by 2020. Yet 
today, more than 99 percent of things in the 
physical world remain unconnected. The growth 
and convergence of processes, data, and things 
on the Internet will make networked connections 
more relevant and valuable than ever before, 
creating unprecedented opportunities for 
industries, businesses, and people.
Oracle Simplifies Internet of Things 
Solutions 
 Real-time response capabilities for 
millions of device endpoints 
 Faster time to market 
 End-to-end security 
 Integration with IT systems 
 A worldwide, coordinated ecosystem of 
partners 
 End-to-end compatibility and lifecycle 
solution management
 Smart cities 
 Smart environment 
 Smart metering 
 Security and emergencies 
 Retail 
 Industrial control 
 Home automation 
 Health
 Home automation & security 
› Smart Appliances 
› Everyday processes: automated 
› Temperature, humidity and quality 
controlled environment 
› Security from thefts and attacks 
› Safety for all family members
 A “smart home” can be defined as a 
residence equipped with computing 
and information technology which 
anticipates and responds to the need of 
its occupants, working to promote their 
comfort, convenience, security and 
entertainment through the management 
of technology within the home and 
connections to the world beyond. [2]
 Internet of things can be used to bolster 
home security by using devices that 
monitor unexpected movement, thermal 
radiations and unwarranted entry. [3]
 Connectivity challenges (Bluetooth, WiFi, 
ZigBee) [4] 
 Security concerns (thingbots) [5] 
 Data theft [6] 
 Data generation & storage [7] 
 Energy challenges [8]
Future implementation of IoT
 https://www.youtube.com/watch?featur 
e=player_embedded&v=QaTIt1C5R-M
 We must expand smart- object design beyond 
hardware and software to include interaction 
design as well as social aspects. [9]6 
 Building applications with RFID data in the IoT is 
challenging, not just because TREs provide only 
low-level information but also because the 
metadata associated with tags, antennas, and 
events must be personalized and carefully 
controlled to create a safe, meaningful user 
experience. [10] 
 With the emergence of an Internet of things, 
new regulatory approaches to ensure its 
privacy and security become necessary.[11]
Zhang, Guo-Qing; Zhang, Guo-Qiang; Yang, Qing-Feng; 
Cheng, Su-Qi; and Zhou, Tao. “Evolution of the Internet and its 
Cores.” New Journal of Physics 10 (2008) 123027 
[1]R. H. Weber, "Internet of Things - New Security and Privacy 
Challenges", Computer Law & Security Review 26 (2010), Elsevier 
ScienceDirect 
 Frances K. Aldrich, “Smart Homes: past, present and future”, 
Inside the Smart Home 2003, Springer 
G. Kortuem et al, "Smart Objects as building blocks of Internet of 
things", IEEE Internet Computing Jan/Feb 2010, IEEE Computer 
Society
 Liu, Jing, Yang Xiao, and CL Philip Chen. "Authentication and 
Access Control in the Internet of Things." ICDCS Workshops. 2012., 
IEEE Computer Society 
 Roman, Rodrigo, Pablo Najera, and Javier Lopez. "Securing the 
internet of things." Computer 44.9 (2011): 51-58. 
 K. Ashton, "The Internet of Things' thing", RFID Journal June 2009 
 E. Welbourne et al, "Building the Internet of Things using RFID", 
IEEE Internet Computing May/June 2009, IEEE Computer Society 
 A. Sarma et al, "Identities in the future Internet of Things", 
Wireless Personal Communications: An International Journal, May 
2009, ACM Digital Library& more
Overview of internet of things (IoT) the new upcoming technology in hand

More Related Content

What's hot

Internet of Things - IoT
Internet of Things - IoTInternet of Things - IoT
Internet of Things - IoT
Farjad Noor
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
AI Publications
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
IoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspectsIoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspects
Roberto Minerva
 
Designing the Internet of Things
Designing the Internet of ThingsDesigning the Internet of Things
Designing the Internet of Things
Massimiliano Dibitonto
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
johnson jawahar
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Sayyed Rifaquat Hussain
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
Istabraq M. Al-Joboury
 
Internet of things
Internet of thingsInternet of things
Internet of things
Sandisiwe Sixanda
 
A Quick Snapshot of the Internet of Things
A Quick Snapshot of the Internet of ThingsA Quick Snapshot of the Internet of Things
A Quick Snapshot of the Internet of Things
Sprint Business
 
Introduction to Internet Of Things
Introduction to Internet Of ThingsIntroduction to Internet Of Things
Introduction to Internet Of Things
Siddharth Dayalwal
 
internet of things
internet of thingsinternet of things
internet of things
ayushi mandlik
 
Internet of Things (Iot)
Internet of Things (Iot)Internet of Things (Iot)
Internet of Things (Iot)
Nasir Mahmood
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT Architecture
Naseeba P P
 
Research Issues, Challenges and Directions in IoT (Internet of Things)
 Research Issues, Challenges and Directions in IoT (Internet of Things) Research Issues, Challenges and Directions in IoT (Internet of Things)
Research Issues, Challenges and Directions in IoT (Internet of Things)
Praveen Hanchinal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
Puneet Mishra
 
TQL - an IoT application platform
TQL - an IoT application platformTQL - an IoT application platform
TQL - an IoT application platform
Jane Ren
 
تعلم الانترنيت
تعلم الانترنيتتعلم الانترنيت
تعلم الانترنيت
jinanAlmousawy
 

What's hot (20)

IoT Introduction
IoT IntroductionIoT Introduction
IoT Introduction
 
Internet of Things - IoT
Internet of Things - IoTInternet of Things - IoT
Internet of Things - IoT
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspectsIoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspects
 
Designing the Internet of Things
Designing the Internet of ThingsDesigning the Internet of Things
Designing the Internet of Things
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Internet of Things (IoT): Readme
Internet of Things (IoT): ReadmeInternet of Things (IoT): Readme
Internet of Things (IoT): Readme
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
A Quick Snapshot of the Internet of Things
A Quick Snapshot of the Internet of ThingsA Quick Snapshot of the Internet of Things
A Quick Snapshot of the Internet of Things
 
Introduction to Internet Of Things
Introduction to Internet Of ThingsIntroduction to Internet Of Things
Introduction to Internet Of Things
 
internet of things
internet of thingsinternet of things
internet of things
 
Internet of Things (Iot)
Internet of Things (Iot)Internet of Things (Iot)
Internet of Things (Iot)
 
IoT Architecture
IoT ArchitectureIoT Architecture
IoT Architecture
 
Research Issues, Challenges and Directions in IoT (Internet of Things)
 Research Issues, Challenges and Directions in IoT (Internet of Things) Research Issues, Challenges and Directions in IoT (Internet of Things)
Research Issues, Challenges and Directions in IoT (Internet of Things)
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
 
TQL - an IoT application platform
TQL - an IoT application platformTQL - an IoT application platform
TQL - an IoT application platform
 
تعلم الانترنيت
تعلم الانترنيتتعلم الانترنيت
تعلم الانترنيت
 

Similar to Overview of internet of things (IoT) the new upcoming technology in hand

Internet of things: A beginners' guide
Internet of things: A beginners' guideInternet of things: A beginners' guide
Internet of things: A beginners' guide
Amala Putrevu
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
NANDA RANI
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
Gaurav Sumer Singh
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Mohan Kumar G
 
PPT ON INTERNET OF THINGS.pptx
PPT ON INTERNET OF THINGS.pptxPPT ON INTERNET OF THINGS.pptx
PPT ON INTERNET OF THINGS.pptx
SwagatoBiswas
 
Application and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyApplication and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information Technology
Dr. Amarjeet Singh
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
cetabac
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
Sampath737246
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
ssuser2cc0d4
 
IoT(Internet of Things) Report
IoT(Internet of Things) ReportIoT(Internet of Things) Report
IoT(Internet of Things) Report
Hitesh Kumar Singh
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
ttyu2
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Thingspandey97
 
IoT
IoT  IoT
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
ImXaib
 
L1-Intro-IoT.pptx
L1-Intro-IoT.pptxL1-Intro-IoT.pptx
L1-Intro-IoT.pptx
jayakumar703719
 
IOT
IOTIOT
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
VET4SBO Level 1   module 3 - unit 1 - v1.0 enVET4SBO Level 1   module 3 - unit 1 - v1.0 en
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
Karel Van Isacker
 
Internet of things
Internet of thingsInternet of things
Internet of things
Naiyer Khan
 
IoT-updated.pptx
IoT-updated.pptxIoT-updated.pptx
IoT-updated.pptx
SumitKumar461344
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Tarika Verma
 

Similar to Overview of internet of things (IoT) the new upcoming technology in hand (20)

Internet of things: A beginners' guide
Internet of things: A beginners' guideInternet of things: A beginners' guide
Internet of things: A beginners' guide
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
PPT ON INTERNET OF THINGS.pptx
PPT ON INTERNET OF THINGS.pptxPPT ON INTERNET OF THINGS.pptx
PPT ON INTERNET OF THINGS.pptx
 
Application and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyApplication and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information Technology
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
IoT(Internet of Things) Report
IoT(Internet of Things) ReportIoT(Internet of Things) Report
IoT(Internet of Things) Report
 
CHAPTER 4.pptx
CHAPTER 4.pptxCHAPTER 4.pptx
CHAPTER 4.pptx
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT
IoT  IoT
IoT
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
L1-Intro-IoT.pptx
L1-Intro-IoT.pptxL1-Intro-IoT.pptx
L1-Intro-IoT.pptx
 
IOT
IOTIOT
IOT
 
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
VET4SBO Level 1   module 3 - unit 1 - v1.0 enVET4SBO Level 1   module 3 - unit 1 - v1.0 en
VET4SBO Level 1 module 3 - unit 1 - v1.0 en
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT-updated.pptx
IoT-updated.pptxIoT-updated.pptx
IoT-updated.pptx
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Overview of internet of things (IoT) the new upcoming technology in hand

  • 1.
  • 2.  "In the next century, planet earth will don an electronic skin. It will use the Internet as a scaffold to support and transmit its sensations."- Neil Gross, 1999  In a recent study, the researchers have predicted that the Internet will double in size every 5.32 years  By 2020, 20 billion devices will be in use in the world [0]
  • 3.  The Internet of Things is an emerging global Internet-based technical architecture facilitating the exchange of goods in a global supply-chain network.[1]  Rapid advancement in technology in just 21 years  IPv6 communication  Protocol for M2M communication  Smart sensors  Cloud storage  Sophisticated algorithms via machine learning
  • 4.  The Internet of Things (IoT) is a scenario in which objects, animals or people are provided with unique identifiers and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. IoT has evolved from the convergence of wireless technologies, micro-electromechanical systems (MEMS) and the Internet.
  • 5.  A thing, in the Internet of Things, can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low -- or any other natural or man-made object that can be assigned an IP address and provided with the ability to transfer data over a network. So far, the Internet of Things has been most closely associated with machine-to-machine (M2M) communication in manufacturing and power, oil and gas utilities. Products built with M2M communication capabilities are often referred to as being smart. (See: smart label, smart meter, smart grid sensor)
  • 6.
  • 7.  The Internet of Things is a difficult concept to define precisely. In fact, there are many different groups that have defined the term, although its initial use has been attributed to Kevin Ashton, an expert on digital innovation. Each definition shares the idea that the first version of the Internet was about data created by people, while the next version is about data created by things. In 1999, Ashton said it best in this quote from an article in the RFID Journal:
  • 8.  "If we had computers that knew everything there was to know about things - using data they gathered without any help from us - we would be able to track and count everything, and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best".
  • 9.  Most of us think about being connected in terms of computers, tablets and smartphones. IoT describes a world where just about anything can be connected and communicate in an intelligent fashion. In other words, with the Internet of Things, the physical world is becoming one big information system.
  • 10.  Cisco estimates that 50 billion devices and objects will be connected to the Internet by 2020. Yet today, more than 99 percent of things in the physical world remain unconnected. The growth and convergence of processes, data, and things on the Internet will make networked connections more relevant and valuable than ever before, creating unprecedented opportunities for industries, businesses, and people.
  • 11. Oracle Simplifies Internet of Things Solutions  Real-time response capabilities for millions of device endpoints  Faster time to market  End-to-end security  Integration with IT systems  A worldwide, coordinated ecosystem of partners  End-to-end compatibility and lifecycle solution management
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.  Smart cities  Smart environment  Smart metering  Security and emergencies  Retail  Industrial control  Home automation  Health
  • 18.  Home automation & security › Smart Appliances › Everyday processes: automated › Temperature, humidity and quality controlled environment › Security from thefts and attacks › Safety for all family members
  • 19.
  • 20.  A “smart home” can be defined as a residence equipped with computing and information technology which anticipates and responds to the need of its occupants, working to promote their comfort, convenience, security and entertainment through the management of technology within the home and connections to the world beyond. [2]
  • 21.  Internet of things can be used to bolster home security by using devices that monitor unexpected movement, thermal radiations and unwarranted entry. [3]
  • 22.
  • 23.  Connectivity challenges (Bluetooth, WiFi, ZigBee) [4]  Security concerns (thingbots) [5]  Data theft [6]  Data generation & storage [7]  Energy challenges [8]
  • 24.
  • 25.
  • 26.
  • 28.
  • 29.
  • 30.
  • 32.  We must expand smart- object design beyond hardware and software to include interaction design as well as social aspects. [9]6  Building applications with RFID data in the IoT is challenging, not just because TREs provide only low-level information but also because the metadata associated with tags, antennas, and events must be personalized and carefully controlled to create a safe, meaningful user experience. [10]  With the emergence of an Internet of things, new regulatory approaches to ensure its privacy and security become necessary.[11]
  • 33. Zhang, Guo-Qing; Zhang, Guo-Qiang; Yang, Qing-Feng; Cheng, Su-Qi; and Zhou, Tao. “Evolution of the Internet and its Cores.” New Journal of Physics 10 (2008) 123027 [1]R. H. Weber, "Internet of Things - New Security and Privacy Challenges", Computer Law & Security Review 26 (2010), Elsevier ScienceDirect  Frances K. Aldrich, “Smart Homes: past, present and future”, Inside the Smart Home 2003, Springer G. Kortuem et al, "Smart Objects as building blocks of Internet of things", IEEE Internet Computing Jan/Feb 2010, IEEE Computer Society
  • 34.  Liu, Jing, Yang Xiao, and CL Philip Chen. "Authentication and Access Control in the Internet of Things." ICDCS Workshops. 2012., IEEE Computer Society  Roman, Rodrigo, Pablo Najera, and Javier Lopez. "Securing the internet of things." Computer 44.9 (2011): 51-58.  K. Ashton, "The Internet of Things' thing", RFID Journal June 2009  E. Welbourne et al, "Building the Internet of Things using RFID", IEEE Internet Computing May/June 2009, IEEE Computer Society  A. Sarma et al, "Identities in the future Internet of Things", Wireless Personal Communications: An International Journal, May 2009, ACM Digital Library& more